Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight Key Management Protocols for Smart Grids., , , , and . iThings/GreenCom/CPSCom/SmartData, page 345-348. IEEE, (2016)Masking the Energy Behavior of DES Encryption., , , , , , and . DATE, page 10084-10089. IEEE Computer Society, (2003)Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems, , , and . CoRR, (2007)Long term key management architecture for SCADA systems., and . WF-IoT, page 314-319. IEEE, (2018)Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation., , , and . iThings/GreenCom/CPSCom/SmartData, page 115-122. IEEE, (2016)Exploiting bank locality in multi-bank memories., , , and . CASES, page 287-297. ACM, (2003)Compiler-directed cache polymorphism., , , , , and . LCTES-SCOPES, page 165-174. ACM, (2002)Code protection for resource-constrained embedded devices., , , , , and . LCTES, page 240-248. ACM, (2004)A Data-Driven Approach for Embedded Security., , , , and . ISVLSI, page 104-109. IEEE Computer Society, (2005)Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems., , , and . DATE, page 882-887. IEEE Computer Society, (2005)